思科网络工程师题库4

上传人:凉**** 文档编号:325465541 上传时间:2022-07-18 格式:DOCX 页数:79 大小:1.55MB
返回 下载 相关 举报
思科网络工程师题库4_第1页
第1页 / 共79页
思科网络工程师题库4_第2页
第2页 / 共79页
思科网络工程师题库4_第3页
第3页 / 共79页
思科网络工程师题库4_第4页
第4页 / 共79页
思科网络工程师题库4_第5页
第5页 / 共79页
点击查看更多>>
资源描述

《思科网络工程师题库4》由会员分享,可在线阅读,更多相关《思科网络工程师题库4(79页珍藏版)》请在金锄头文库上搜索。

1、思科网络工程师题库201-327Q201.An organization is implementing URL blocking using Cisco UmbrellA. The users are able to go to some sites but other sites are not accessible due to an error. Why is the error occurring?A.Client computers do not have the Cisco Umbrella Root CA certificate installed.B.IP-Layer Enf

2、orcement is not configured.C.Client computers do not have an SSL certificate deployed from an internal CA server.D.Intelligent proxy and SSL decryption is disabled in the policy.Answer: AExplanation:Other features are dependent on SSL Decryption functionality, which requires the Cisco Umbrella root

3、certificate. Having the SSL Decryption feature improves:Custom URL Blocking-Required to block the HTTPS version of a URL.Umbrellas Block Page and Block Page Bypass features present an SSL certificate to browsers that make connections to HTTPS sites. This SSL certificate matches the requested site bu

4、t will be signed by the Cisco Umbrella certificate authority (CA). If the CA is not trusted by your browser, an error page may be displayed. Typical errors include The security certificate presented by this website was not issued by atrusted certificate authority (Internet Explorer), The sites secur

5、ity certificate is not trusted! (Google Chrome) or This Connection is Untrusted (Mozilla Firefox). Although the error page is expected, the message displayed can be confusing and you may wish to prevent it from appearing. To avoid these error pages, install the Cisco Umbrella root certificate into y

6、our browser or the browsers of your users-if youre a network admin.Reference:https:/docs.umbrell A.com/deployment-umbrella/docs/rebrand-cisco-certificate-import-informationQ202.Which two aspects of the cloud PaaS model are managed by the customer but not the provider? (Choose two)A.virtualizationB.m

7、iddlewareC.operating systemsD.applicationsE.data Answer: DE Explanation:Customers must manage applications and data in PaaS.Q203.What is an attribute of the DevSecOps process?A.mandated security controls and check listsB.security scanning and theoretical vulnerabilitiesC.development securityD.isolat

8、ed security team Answer: CExplanation:DevSecOps (development, security, and operations) is a concept used in recent years to describe how to move security activities to the start of the development life cycle and have built-in security practices in the continuous integration/continuous deployment (C

9、I/CD) pipeline. Thus minimizing vulnerabilities and bringing security closer to IT and business objectives.Three key things make a real DevSecOps environment:+ Security testing is done by the development team.+ Issues found during that testing is managed by the development team.+ Fixing those issues

10、 stays within the development team.Q204.An engineer notices traffic interruption on the network. Upon further investigation, it is learned that broadcast packets have been flooding the network.What must be configured, based on a predefined threshold, to address this issue?A.Bridge Protocol Data Unit

11、 guardB.embedded event monitoringC.storm controlD.access control lists Answer: C Explanation:Storm control prevents traffic on a LAN from being disrupted by a broadcast, multicast, or unicast storm on one of the physical interfaces. A LAN storm occurs when packets flood the LAN, creating excessive t

12、raffic and degrading network performance. Errors in the protocol-stack implementation, mistakes in network configurations, or users issuing a denial-of-service attack can cause a storm. By using the storm-control broadcast level falling-threshold we can limit the broadcast traffic on the switch.Q205

13、.Which two cryptographic algorithms are used with IPsec? (Choose two)A.AES-BACB.AES-ABCC.HMAC-SHA1/SHA2D.Triple AMC-CBCE.AES-CBC Answer: CE Explanation:Cryptographic algorithms defined for use with IPsec include:+ HMAC-SHA1/SHA2 for integrity protection and authenticity.+ TripleDES-CBC for confident

14、iality+ AES-CBC and AES-CTR for confidentiality.+ AES-GCM and ChaCha20-Poly1305 providing confidentiality and authentication together efficiently.Q206.In which type of attack does the attacker insert their machine between two hosts that are communicating with each other?A.LDAP injectionB.man-in-the-

15、middleC.cross-site scriptingD.insecure API Answer: B Explanation:New Questions (added on 2nd-Jan-2021)Q207.Which Dos attack uses fragmented packets to crash a target machine?A.smurfB.MITMC.teardropD.LAND Answer: C Explanation:A teardrop attack is a denial-of-service (DoS) attack that involves sending fragmented packets to a target machine. Since the machine receiving such packets cannot reassemble them due to a bug in TCP/IP fragmentation re

展开阅读全文
相关资源
正为您匹配相似的精品文档
相关搜索

最新文档


当前位置:首页 > 资格认证/考试 > 网络工程师认证 > 思科认证

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号